CVE-2023-53654Incorrect Calculation of Buffer Size in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Add validation before accessing cgx and lmac with the addition of new MAC blocks like CN10K RPM and CN10KB RPM_USX, LMACs are noncontiguous and CGX blocks are also noncontiguous. But during RVU driver initialization, the driver is assuming they are contiguous and trying to access cgx or lmac with their id which is resulting in kernel panic. This patch fixes the issue by adding proper checks. [ 23.219150] pc : c

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.125.15.121+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux91c6945ea1f9059fea886630d0fd8070740e2aafe425e2ba933618ee5ec8e4f3eb341efeb6c9ddef+4
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53654: In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Add validation before accessing cgx and lmac with the addition of ne2025-10-07
GHSA
GHSA-qw28-7x42-46v9: In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Add validation before accessing cgx and lmac with the addition of2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: octeontx2-af: Add validation before accessing cgx and lmac2025-10-07
Debian
CVE-2023-53654: linux - In the Linux kernel, the following vulnerability has been resolved: octeontx2-a...2023